Platform)
Review of functional and technical analysis
• Coordination and execution of integration and customization testing
• Technical interface with other IT areas (Architecture, Ops, Data, Security)
• Cross IT activities across projects of this nature...
Role Description
• Support and advise on management of information security and associated controls;
• Support and advise on management of risk and provide a transparent view of risk posture to stakeholders;
• Support and advise on compliance...
all’avanguardia e il rispetto delle principali normative europee.
Responsabilità
• Realizzare Security Assessment (Gap Analysis) basati sugli standard ISA/IEC 62443-2-1, 3-2, 4-1, 4-2, presso i clienti.
• Eseguire Cybersecurity Risk Assessment utilizzando...
both written and verbal).
• Exceptional attention to detail and quality.
• Excellent problem-solving techniques and trouble analysis skills.
• Endpoint security concepts, controls, and best practices for Servers (e.g., Windows and Linux).
• General IT...
and is sold in over 120 countries. Join one of the fastest-growing cybersecurity companies and gain valuable skills while expanding and developing customer relationships in this pivotal role! About Keeper Keeper Security is transforming cybersecurity for...
security standards.
• Create a state-of-the-art secure cloud architecture and strategy, supported by a robust and flexible infrastructure with reliable and efficient operating model.
• Run post-mortem incidents analysis.
• Review the security principles...
translating technical and business requirement into physical installations.
• May handle customer inquiries.
• Participates in activities related to IT security and cybersecurity: support recovery programs, run system analysis, identify potential issues...
and deployments of service components.
• Participate in all activities related to IT security and cybersecurity with the aim of mitigating risk and supporting recovery programs for the area of responsibility. Run system analysis to identify potential issues...
root cause analysis and correlation of other system and/or problems.
• Identify, record, document and track bugs in a thorough manner.
• Adheres and respects security and cybersecurity company policies.
Required Skills and Experience
• Master’s degree...